0
Instructor Name

Achrya

Category

Cyber Security

Reviews

0 (0 Rating)

Course Requirements

General knowledge about the internet and website development

General knowledge of Linux and networking

Course Description

A website vulnerability is a weakness or misconfiguration in a website or web application code that allows an attacker to gain some level of control of the site, and possibly the hosting server. Most vulnerabilities are exploited through automated means, such as vulnerability scanners and botnets. There are a lot of common web application vulnerabilities as a result of insecure code development practices or using vulnerable software, some examples are: SQL Injection, Cross Site Scripting (XSS), Command Execution, File Injection, Cross Site Request Forgery (CSRF), etc.   

   


   


   


Kali Linux is a Linux distribution that is specialized for cybersecurity. It is an open-source product that involves a lot of customization for penetration testing, which helps companies to understand their vulnerabilities. It is maintained and funded by Offensive Security.   

   


   


   


A web application firewall (WAF) protects web applications from a variety of application layer attacks such as cross-site scripting (XSS), SQL injection, and cookie poisoning, among others. Attacks to apps are the leading cause of breaches\u2014they are the gateway to your valuable data.   

   


   


   


In this course, you will learn about web application ethical hacking techniques including using some Kali Linux tools 

   


Introduction to web penetration testing and ethical hacking   

   


Designing and building a lab environment for pen testing   

   


Understanding website vulnerabilities and general attacks   

   


Understanding how to protect your website against attacks   

   


Secure coding and web application firewalls   

   


   


   


Who this course is for:


  

Cybersecurity engineers, experts and students   

Security professionals   

Penetration testers   

Web Application developers

Course Curriculum

1 🏹 Welcome
11 Min


2 🏹 About the Instructor
11 Min


3 🏹 Course Structure
11 Min


1 🏹 Lab Setup Overview
11 Min


2 🏹 Lab Setup - Hyper-V
11 Min


3 🏹 Lab Setup - VirtualBox
11 Min


4 🏹 Lab Setup - Kali Linux
11 Min


5 🏹 Lab Setup - Docker
11 Min


1 🏹 Servers and Clients
11 Min


2 🏹 Lab - Nginx and Server Logs
11 Min


3 🏹 HTTP
11 Min


4 🏹 The Web Trinity
11 Min


5 🏹 HTML
11 Min


6 🏹 CSS
11 Min


7 🏹 JavaScript
11 Min


8 🏹 Lab - Alert Button
11 Min


9 🏹 ZAP Intro
11 Min


10 🏹 Lab - ZAP Enumeration
11 Min


1 🏹 PHP
11 Min


2 🏹 Lab - PHP with Docker
11 Min


3 🏹 Server Side Security Considerations
11 Min


4 🏹 Lab - Wordpress
11 Min


5 🏹 Lab - DVWA
11 Min


1 🏹 OWASP Overview
11 Min


2 🏹 Broken Access Control
11 Min


3 🏹 Cryptographic Failures
11 Min


4 🏹 Injection - XSS
11 Min


5 🏹 Injection - Command Injection
11 Min


6 🏹 Insecure Design
11 Min


7 🏹 Security Misconfiguration
11 Min


8 🏹 Vulnerable and Outdated Components
11 Min


9 🏹 Identification and Authentication Failures
11 Min


10 🏹 Software and Data Integrity Failures
11 Min


11 🏹 Server-Side Request Forgery
11 Min


1 🏹 Client-Side Webapp Intro
11 Min


2 🏹 Lab - Juice Shop
11 Min


3 🏹 Frontend Considerations
11 Min


1 🏹 Preparation
11 Min


2 🏹 Scoping
11 Min


3 🏹 Enumeration
11 Min


4 🏹 Manual Testing
11 Min


5 🏹 Automated Attacks
11 Min


1 🏹 Automatic Enumeration
11 Min


2 🏹 Manual Enumeration
11 Min


3 🏹 Discoveries
11 Min


4 🏹 Login/Authentication
11 Min


5 🏹 Purchasing
11 Min


6 🏹 Customer Support
11 Min


7 🏹 Additional API Testing
11 Min


8 🏹 Legacy Code
11 Min


1 🏹 Report Structure
11 Min


2 🏹 Writing Tips
11 Min


Instructor

Achrya

0 Rating
0 Reviews
24773 Students
11 Courses

5+ years of combined operational work experience in penetration tests of enterprise networks and

web application, physical social engineering, and privilege escalation.

As a member of the Enterprise Security and Risk Team, I conduct enterprise-wide security risk

assessments by infiltrating its systems and breaching its physical perimeters.

He trained Over 1000+ students Worldwide in the offensive Security domain.

TOP 10 in the World Global Ethical Hacking Leader Board!

Student Feedback

Web Application Penetration Testing (Live)

5

Course Rating
0.00%
0.00%
0.00%
0.00%
0.00%

No Review found

Sign In or Sign Up as student to post a review

Reviews